摘要
随着物联网应用的普及,高效的轻量级分组密码对于保障资源受限设备的信息安全具有重要意义.本文提出一种高效的轻量级分组密码算法,命名为HBcipher. HBcipher分组长度为64位,密钥长度支持64位和128位.算法轮函数采用三组SPN结构的F函数,且在设计F函数时利用几何图形映射性质构造一种P2置换方法,充分隐藏明文的统计特性,提高抗统计分析的能力,为避免最后一轮完全暴露给攻击者,我们在最后一轮P2置换输出后,增加白化密钥加模块.同时,我们设计了一种动态轮密钥加运算操作,加密数据根据算法轮运算控制信号的奇偶性来动态选择更新后的子密钥,与一般静态密钥加相比,提高了算法灵活性和安全性,特别是抵抗自相似攻击.实验证明, HBcipher算法具有良好的雪崩效应、随机化特性,并且与偏向硬件实现的PRESENT算法相比其软件实现性能更优越,而与偏向软件实现的RECTANGLE算法相比其硬件实现面积更小.最后,对HBcipher进行了安全分析,结果表明其具有抵抗差分攻击、线性攻击等已知攻击的能力.
With the popularity of IoT applications,it has a great significance to design efficient and lightweight block ciphers to ensure the information security for the resource-constrained devices.This study designs a high-efficiency lightweight block cipher named HBcipher.Its block length is 64 bits and it supports key lengths of 64 bits and 128 bits.The round function of HBcipher adopts three sets of F-functions of SPN structure,and constructs a new P2 permutation by using geometric mapping properties when designing the F-function,which effectively hides the statistical characteristics of plaintext and improves the ability of anti-statistical analysis.In order to avoid completely exposing the last round to the attacker,a whitening key module is added after the last round of P2 permutation output.Meanwhile,a dynamic AddRoundKey operation is designed.The encrypted data dynamically selects the updated subkey according to the parity of the algorithm’s control signal.Compared with the general static AddRoundKey,the algorithm improves the flexibility,security,and especially the ability of resisting the self-similar attack.The experimental results show that the HBcipher algorithm has nice avalanche effect and randomization characteristics,and its software implementation performance is superior to the PRESENT which is optimized for hardware implementation.Compared with the RECTANGLE which is optimized for software implementation,the hardware implementation area of HBcipher is smaller.Security analyses shows that the HBcipher algorithm has the ability to resist the currently known attacks such as differential and linear.
作者
李浪
郭影
刘波涛
欧雨
LI Lang;GUO Ying;LIU Bo-Tao;OU Yu(College of Computer Science and Technology,Hengyang Normal University,Hengyang 421002,China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application,Hengyang 421002,China)
出处
《密码学报》
CSCD
2019年第3期336-352,共17页
Journal of Cryptologic Research
基金
国家自然科学基金(61572174)
湖南省中央引导地方科技发展专项资金(2018CT5001)
湖南省自然科学基金(2019JJ60004)
湖南省“双一流”应用特色学科(湘教通[2018]469号)
湖南省科技计划项目(2016TP1020)
衡阳师范学院学科群建设项目(18XKQ02)
衡阳师范学院产学研基金(16CXYZ01)~~